On the correlation of parity and small-depth circuits

Similar documents
CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds

CS6840: Advanced Complexity Theory Mar 29, Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K.

Notes for Lecture 25

EXPONENTIAL LOWER BOUNDS FOR DEPTH THREE BOOLEAN CIRCUITS

1 AC 0 and Håstad Switching Lemma

Certifying polynomials for AC 0 [ ] circuits, with applications

Lecture 3: AC 0, the switching lemma

Resolution and the Weak Pigeonhole Principle

Resolution Lower Bounds for the Weak Pigeonhole Principle

Lecture 2: Proof of Switching Lemma

An Improved Deterministic #SAT Algorithm for Small De Morgan Formulas

Lecture 4: LMN Learning (Part 2)

On converting CNF to DNF

CIRCUIT COMPLEXITY AND PROBLEM STRUCTURE IN HAMMING SPACE

Proof Complexity of Quantified Boolean Formulas

A New Lower Bound Technique for Quantum Circuits without Ancillæ

Regular Resolution Lower Bounds for the Weak Pigeonhole Principle

Constructing Oracles by Lower Bound Techniques for Circuits 1

Limitations of Algorithm Power

Subspace-Invariant AC 0 Formulas

Notes on Computer Theory Last updated: November, Circuits

The Strength of Multilinear Proofs

Essential facts about NP-completeness:

INSTITUTE OF MATHEMATICS THE CZECH ACADEMY OF SCIENCES. A trade-off between length and width in resolution. Neil Thapen

On Transformations of Constant Depth Propositional Proofs

Cardinality Networks: a Theoretical and Empirical Study

Yale University Department of Computer Science

Notes for Lecture 2. Statement of the PCP Theorem and Constraint Satisfaction

Lecture 5: February 21, 2017

Poly-logarithmic independence fools AC 0 circuits

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan August 30, Notes for Lecture 1

Size-Depth Tradeoffs for Boolean Formulae

CIRCUIT COMPLEXITY AND PROBLEM STRUCTURE IN HAMMING SPACE

Two Sides of the Coin Problem

Pseudorandom Bits for Constant Depth Circuits with Few Arbitrary Symmetric Gates

A note on monotone real circuits

Lecture 10: Learning DNF, AC 0, Juntas. 1 Learning DNF in Almost Polynomial Time

CS151 Complexity Theory. Lecture 6 April 19, 2017

On extracting computations from propositional proofs (a survey)

On the Automatizability of Resolution and Related Propositional Proof Systems

Lecture 11: Proofs, Games, and Alternation

Comp487/587 - Boolean Formulas

CMSC 858F: Algorithmic Lower Bounds Fall SAT and NP-Hardness

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015

Stanford University CS254: Computational Complexity Handout 8 Luca Trevisan 4/21/2010

ENTROPY OF OPERATORS OR WHY MATRIX MULTIPLICATION IS HARD FOR DEPTH-TWO CIRCUITS

NP Complete Problems. COMP 215 Lecture 20

Löwenheim-Skolem Theorems, Countable Approximations, and L ω. David W. Kueker (Lecture Notes, Fall 2007)

Guest Lecture: Average Case depth hierarchy for,, -Boolean circuits. Boaz Barak

Strong Computational Lower Bounds via Parameterized Complexity

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds

Solving SAT for CNF formulas with a one-sided restriction on variable occurrences

A note on exponential circuit lower bounds from derandomizing Arthur-Merlin games

A Duality between Clause Width and Clause Density for SAT

Classes of Boolean Functions

The complexity of formula minimization

Lecture 5: February 16, 2012

Lecture 2: Connecting the Three Models

Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size

Trichotomy Results on the Complexity of Reasoning with Disjunctive Logic Programs

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization

6.842 Randomness and Computation April 2, Lecture 14

Computational Learning Theory - Hilary Term : Introduction to the PAC Learning Framework

ALGEBRAIC PROOFS OVER NONCOMMUTATIVE FORMULAS

On the Complexity of the Reflected Logic of Proofs

Lecture 1: 01/22/2014

An algorithm for the satisfiability problem of formulas in conjunctive normal form

1 Circuit Complexity. CS 6743 Lecture 15 1 Fall Definitions

Guarded resolution for Answer Set Programming

CS 350 Algorithms and Complexity

c 2004 Society for Industrial and Applied Mathematics

1 Randomized Computation

Lecture 4: NP and computational intractability

CMSC 858F: Algorithmic Lower Bounds Fall SAT and NP-Hardness

18.10 Addendum: Arbitrary number of pigeons

Connectedness. Proposition 2.2. The following are equivalent for a topological space (X, T ).

Majority is incompressible by AC 0 [p] circuits

Lecture 16: Communication Complexity

Outline. Complexity Theory. Introduction. What is abduction? Motivation. Reference VU , SS Logic-Based Abduction

CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010

20.1 2SAT. CS125 Lecture 20 Fall 2016

Announcements. Friday Four Square! Problem Set 8 due right now. Problem Set 9 out, due next Friday at 2:15PM. Did you lose a phone in my office?

Exercises 1 - Solutions

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

RESOLUTION OVER LINEAR EQUATIONS AND MULTILINEAR PROOFS

Homework 4 Solutions

CS 350 Algorithms and Complexity

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

A Collection of Problems in Propositional Logic

: On the P vs. BPP problem. 18/12/16 Lecture 10

Tecniche di Verifica. Introduction to Propositional Logic

18.5 Crossings and incidences

Quantum Circuits: Fanout, Parity, and Counting

On the tightness of the Buhrman-Cleve-Wigderson simulation

About the impossibility to prove P NP or P = NP and the pseudo-randomness in NP

Lower Bounds for Bounded Depth Frege Proofs via Buss-Pudlák Games

Non-Deterministic Time

An Introduction to Proof Complexity, Part II.

: On the P vs. BPP problem. 30/12/2016 Lecture 11

Transcription:

Electronic Colloquium on Computational Complexity, Report No. 137 (2012) On the correlation of parity and small-depth circuits Johan Håstad KTH - Royal Institute of Technology November 1, 2012 Abstract We prove that the correlation of a depth-d unbounded fanin circuit of size S with parity of n variables is at most 2 Ω(n/(log S)d 1). 1 Introduction Proving absolute lower bounds for concrete computational problems in realistic models of computation is a holy grail for the area of computational complexity. The general program of proving lower bounds for simple computational models with important early contributions by Furst, Saxe and Sipser [3], Sipser [8], Ajtai [1] Yao [10], Håstad, [4], Smolensky [9] and Razborov [6] seemed to be a promising road of establishing such lower but came to a almost complete halt in late 1980 ies. One possible explanation for this situation is given by the concept of Natural proofs introduced by Razborov and Rudish [7] but a new generation of researchers might find different techniques making what now seems impossible be feasible. Possibly the simplest non-trivial model of computation is that of boundeddepth Boolean circuits of unbounded fanin. Such a circuit contains AND-gates and OR-gates of unbounded fanin, takes as inputs literals (i.e. variables in positive or negated form) and has a depth that is bounded by a constant independent of the number of variables. It was a major step forward when Ajtai [1] and Furst, Saxe, and Sipser [3] independently proved that the simple function of parity requires circuits of superpolynomial size to be computed in this model. These bounds were later improved by Yao [10] and Håstad [4] establishing that size exp(n θ( 1 d 1 ) ) was necessary and sufficient to compute the parity of n variables by a depth-d circuit. These results were based on the concept of random restrictions where most inputs of a circuit are fixed to constants in order to simplify the circuit. The key observation is that the simplified circuit should compute the parity (or Research supported by ERC Advanced grant 226 203. 1 ISSN 1433-8092

possible the negation of this function) on the remaining variables and thus if these simplifications are substantial enough a contradiction is obtained. To be more concrete, by tuning parameters, it is possible to chose a restriction such that one can remove one level of the circuit. This is achieved by applying the switching lemma of Håstad [4] which says that it possible to switch an and-of-ors into an or-of-ands keeping, with high probability, the bottom fanin small. It is not difficult to see that all the proofs based on restrictions in fact established that any small circuit of constant depth only agrees with parity for marginally more than half of the inputs. If this fraction of agreement is (1 + c)/2 let us call c the correlation. It follows, more or less immediately, from the proof of Håstad that a circuit of size 2 s and depth d only has correlation exp( Ω(n 1 1 d 1 )) with parity provided that s o(n d 1 ). The bottleneck in this argument is the estimate for the probability that we are not able to do the required switching. It is curious that the estimate of the correlation gets only marginally better with decreasing values of s and obtaining a bound better than exp( Ω(n 1 d 2 )) for this correlation seems to require some new idea. Somewhat surprisingly, Ajtai [1], who did not get as strong bounds for the size of depth-d circuits computing parity exactly, proved the stronger bound exp( Ω(n 1 ɛ )) for the correlation of parity and the output of polynomial size circuits of depth d. The correlation was recently proved to be much smaller by Beame, Impagliazzo and Srinivasan [2] who established the rather unusual bound of exp( Ω(n/(2 2ds4/5 ))) for the correlation of circuits of size 2 s and depth d with parity. Motivated by this result and the techniques used we now revisit the old techniques based on the switching lemma with the aim of strengthening the bounds for the correlation of small circuits with parity. Before turning to discussing our methods and results, let us describe how to construct a set of depth-d circuits of reasonably small size that have a nontrivial correlation with parity. Dividing the inputs into groups of size s d 1 it is possible to compute the parity exactly of each such group of inputs with a circuit of size roughly 2 s and depth d. Circuits with this property can be chosen to have either an -gate or -gate as their output gate and let us assume the latter. Taking the disjunction of all these circuits we maintain depth d and get a circuit that mostly outputs one but whenever it outputs zero it always agrees with the parity of the inputs. The correlation of this circuit with parity is easily seen to be 2 g where g n/s d 1 is the number of groups. The purpose of this paper is to prove that this construction is, up to the constants involved, optimal. The proof is very much based on an extension of the switching lemma, where we do not allow the failure to do the required switching but instead, with small probability, fix some additional variables not set by the original randomized restriction. Similar bounds, by related but not identical methods, have been obtained independently by Impagliazzo, Matthews, and Paturi [5]. The paper by Impagliazzo et al has as main goal to obtain a satisfiability algorithm for AC 0 and 2

the bound for the correlation of parity and small-depth circuits is obtained as a corollary. Our more direct approach leads to, in our eyes, considerably simpler argument. The bounds obtained by [5] are in most cases identical (apart from some involved constants) to ours but for linear size circuits their results are stronger. 2 Preliminaries We study circuits consisting of unbounded fanin - and -gates. We reserve the letter n for the number of inputs to this circuit. We denote by x i, 1 i n the inputs to this circuit and we assume we have a unique output gate as we are interested in circuits computing Boolean functions. The size of the circuit is defined to be the number of gates it contains, not counting the inputs (and in fact most of the time we do not even count the gates next to the inputs). The depth is defined to be longest path from any input to the output. We assume that the gates appear in alternating layers of -gates and -gates as if we have two layers of the same type we can directly move the inputs of the lower gate the higher gate. By introducing dummy gates of fanin one we can assume that the circuit is layered with gates at level i getting inputs from layer i 1. This causes at most a constant blow-up in the size of the circuit and this small change is not important for us. As stated above we allow arbitrary fanin of the gates and as we are dealing with circuits also the fanout is arbitrary. We study the sub-circuits of depth 2 given by the two layers closest to the inputs. We sometimes treat these as disjoint circuits, but in these situations we only include the gates of distance at least two away from the input in the size count and thus we can duplicate any common gates to make the circuits disjoint. We let p [0, 1] be a real number and a random restriction from the space R p is defined by, for each variable x i independently, keeping it as a variable with probability p and otherwise setting it to one of the constants 0 and 1 with equal probability. A typical restriction is denoted by ρ and the notation for keeping a variable is ρ(x i ) = while the other two outputs of ρ are 0 and 1, interpreted in the natural way. For a function f we let f ρ be the function in the untouched variables obtained by making the substitutions described by ρ. We analyze many conditional probabilities and in particular we are interested set of restrictions that are monotone in ρ in the sense that fixing the value of more variables can only make ρ more likely belong to the set. Definition 2.1 A set F of restriction is downward closed if whenever ρ F and ρ (x i ) = ρ(x i ) for all x i such that ρ(x i ) {0, 1} then ρ F. An equivalent definition is to say that for any ρ F changing the value on any input from the value to either non- value, the resulting restriction is also an element of F. 3

The classical conditioning for the switching lemma of [4] is to focus on conditions of the form F ρ 1 for a Boolean function F. It is easy to see that the set of restrictions that satisfy such a condition is downward closed but there are many downward closed sets that are not on this form. One example would be the set of restrictions such that the value of F ρ is independent of the remaining variables (but can be either zero or one). The following simple lemma follows immediately from the definition. Lemma 2.2 Let F and F be two downward closed sets of restrictions. Then the set F F is also downward closed. We assume that the reader is familiar with the concept of a decision tree and we need the following extension. Definition 2.3 A set of functions (g i ) m i=1 has a common s-partial decision tree of depth d, if there is a decision tree of depth d such that at each leaf of this decision tree, each function g i is computable by an ordinary decision tree of depth s of the variables not queried on the given path. Said differently, each path of the decision tree defines a restriction τ that gives values to the queried variables. The claim is that g i τ can be computed by a decision tree of depth s for each i. Finally, let us formally define correlation. Definition 2.4 A function f has correlation c with a function g iff P r[f(x) = g(x)] = (1 + c)/2, where the probability is taken over a uniformly chosen x. 3 The Main argument Let us first state our main theorem. Theorem 3.1 Let f, {0, 1} n {0, 1} be computed by a depth d circuit of bottom fanin t and which contains at most S gates at distance at least 2 from the inputs. Then the correlation of f with parity is bounded by 2 c dn/t(log S) d 2. Note that if t = ω(log S) then replacing d by d + 1 and setting t = 1 gives a stronger bound as compared to applying the theorem directly. As discussed in the introduction, the proof is very much based on the proof of the switching lemma of [4] and let us start be stating this lemma and recalling its proof. In the process we slightly generalize the lemma in that we allow a conditioning of the form that the restriction belongs to an arbitrary set that is downward closed. This generalization follows from the original proof but was not stated. 4

Lemma 3.2 Let f be computed by a depth-2 circuit of bottom fanin t. Let F be a downward closed set of restrictions and ρ a random restriction from R p. Let depth(f ρ ) be the minimal depth of the decision tree computing f ρ. Then P r[depth(f ρ ) s ρ F] (5pt) s. Proof: Suppose, without loss of generality, that f is a CNF, i.e. that it can be written as f = m i=1c i where each C i is a disjunction of at most t literals. The proof is by induction over m and the base case is when m = 0 in which case f ρ is always computable by a decision tree of depth 0. We divide the analysis into two cases depending on whether C 1 is forced to one or not. Let us for notational convenience assume that C 1 is the disjunction of x 1, x 2... x t0 for some t 0 t. Clearly we can bound the probability of the lemma as the maximum of and P r[depth(f ρ ) s ρ F C 1 ρ 1], P r[depth(f ρ ) s ρ F C 1 ρ 1]. (1) The first term is taken care of by induction applied to f without its first conjunction (and thus having size at most m 1) using Lemma 2.2 to ensure that the conditioning is of the correct form. We need to consider the second term (1). To avoid that f ρ 0 there must be some nonempty set, Y of size r > 0 of variables appearing in C 1 which are given the value by ρ. Let us for the time being assume that r < s and we later verify that the resulting estimate is valid also when r s. We construct a decision tree by first querying the variables in Y. One of the 2 r answers forces f to 0 and this will not result in a decision tree of depth at least s. Let τ be an assignment to the variables in Y. We can now bound (1) as P r[depth(f τρ ) s r ρ(y ) = ρ(c 1 /Y ) = 0 ρ F C 1 ρ 1], τ,y where Y is a nonempty set of size r. A key lemma is the following. Lemma 3.3 If Y is a set of set r containing variables from C 1 then ( ) r 2p P r[ρ(y ) = ρ F C 1 ρ 1]. 1 + p Proof: Assume that a restriction ρ contributes to the probability in question. Consider all the ways of constructing restrictions ρ by changing, in all possible ways, the values taken by the restriction on the set Y, taking values only 0 5

and (remember that ρ gives the value to all variables in Y ). Note that any constructed ρ still satisfies the conditioning and that each ρ is constructed from a unique ρ. If ρ is changed to a 0 for k different inputs then and as ( ) k 1 p P r[ρ ] = P r[ρ], 2p r i=0 ( ) r x i = (1 + x) r, (2) i we conclude that the total probability of all restrictions constructed from ρ is at least ( ) r 1 + p P r[ρ] and the lemma follows. Finally we estimate 2p P r[depth(f τρ ) s r ρ(y ) = ρ(c 1 /Y ) = 0 ρ F C 1 ρ 1], by induction. We need to check that the conditioning defines a downward closed set but this is more or less obvious as we are considering restrictions on variables outside Y (as these are already fixed by τ). Changing the value of ρ on any variable not contained in C 1 from to a non- value cannot violate any of the conditions. Thus we can conclude that the probability of obtaining a decision tree of depth at least s is at most ( ) Y 2p (2 Y 1)(5pt) s Y. (3) 1 + p Y Before ending the proof let us observe that this bound is correct also in the case r s, as in this case the depth of the decision tree is always at least ( s and the probability of this case happening is, by Lemma 3.3, bounded by 2p r, 1+p) which is smaller than the corresponding term in (3). Using (2) again we see that we get the final estimate (5pt) s ( ( 1 + ) C1 ( ) ) C1 4 2 1 +. 5t(1 + p) 5t(1 + p) This is an increasing function of C 1 and thus we can assume that this number equals t. The second factor is of the form (1 + 2x) t (1 + x) t and, as this is an increasing function of x and (1 + 2x) (1 + x) 2, it is bounded by y 2 y where y = (1 + 2 5t )t. Finally, as 1 + x e x, this can be upper bounded by e 4/5 e 2/5 < 1 and this finishes the inductive step. 6

In the current proof we will need an extension of the previous lemma where the failure probability is much smaller but of course the conclusion is weaker. Lemma 3.4 Let (f i ) S i=1 be a collection of depth-2 circuit each of bottom fanin t and let s be a parameter satisfying 2 s S. Let F be a downward closed set of restrictions and ρ a random restriction from R p. Then the probability that (f i ρ ) S i=1 is not computable by a common s-partial decision tree of depth m is at most S(20pt) m. This statement is true conditioned on ρ F. Proof: The idea of the proof is to follow the proof of the previous lemma and whenever we run into trouble, we query the offending variables in the decision tree. Let us start the formal proof. We prove the lemma by induction over S and the number of variables n. Clearly the lemma is true if either of these numbers is 0. Similarly to the proof of Lemma 3.2 we divide the analysis into two cases depending on whether f 1 ρ is computable by a decision tree of depth s. Let us first discuss the case when this is indeed true. The set of restrictions such that f 1 ρ is computable by a decision tree of depth at most s is obviously downward closed as changing ρ from to a non- value on any input maintains the property that f 1 ρ can be computed by a decision tree of a given depth. Now we apply the inductive version of the lemma to (f i ) S i=2 and F replaced with the subset of F which has the property that depth(f 1 ρ ) s (which is a downward closed set by Lemma 2.2). A common s-partial decision tree for (f i ρ ) S i=2 is clearly such a decision tree even if we include f 1 ρ and thus the probability of needing more than depth m and being in this case is, by induction, bounded by (S 1)(20pt) m. Now let us look at the more interesting case that f 1 ρ cannot be computed by a decision tree of depth s. In particular, the construction of the decision tree as given in the proof of Lemma 3.2 must come to a point when the number of variables queried is at least s. Inside that proof we have a partially constructed decision tree where some variables T are queried on the current path (and assigned the values given by some restriction τ) and we have identified a set of variables Y given the value by ρ. Let us set T 0 = Y T and define s as the size of this set, i.e., T 0 = s s. We query the variables in T 0 in our common s-partial decision tree that we are constructing. In this way we get 2 s nodes in that partially constructed tree, indexed by assignments τ j to the variables in T 0. We want to apply the induction hypothesis to each of the families (f i τj ) S i=1, when considering restrictions ρ on the variables outside T 0. The key for the proof is the verify that the obtained conditioning is of the correct form and hence that we can apply the induction hypothesis. The conditioning we want to apply is the original ρ F, that ρ(t 0 ) =, and that during the creation of the decision tree in the proof of Lemma 3.2 we reach the node given by a set T, values τ on this set, and a set Y. We claim that these conditions give a downward closed set when considering restrictions taking values outside T 0. This is obvious for the two first conditions 7

and let us be careful with the third condition. Suppose ρ satisfies this condition and let i 0 the the index such that ρ (x i ) = ρ(x i ) when i i o and ρ(x i0 ) =. Remember that i 0 does not belong to T 0. In the proof of Lemma 3.2 we first encounter a clause that is not forced to 1 by ρ and we query these variables in the decision tree (and these variables are put into T and hence, in particular none of these variables is x i0 ). Consider the path of the decision tree giving the values defined by τ (both in the decision trees constructed under ρ and ρ ). These constructions continue on parallel paths finding the next clause which is not forced to one. It is easy to see that also this clause does not contain x i0 and the process continues in identical ways for ρ and ρ until we have found all of T and the set Y. We conclude that also this third conditioning is of the correct form. We have thus queried s variables in our common s-partial decision tree and the probability that any path in this tree needs to query m variables is bounded by the probability that in any of the 2 s nodes, defined by the assignments τ j, we need to query m s additional variables. As we have just verified that we can apply induction (on restrictions outside the set T 0 ) we conclude that the probability of this happening, at any fixed node, is bounded by S(20pt) m s. Be Lemma 3.2 the probability that depth(f ρ ) s is at most (5pt) s and thus the contribution to the overall failure probability of this case is bounded by (5pt) s 2 s S(20pt) m s 2 s S(20pt) m (20pt) m, where we used the assumption that S 2 s. Adding this probability to the probability (S 1)(20pt) m obtained in the first case, finishes the proof. Remark. The argument in the above proof might sound robust but let us point out a rather fragile point. A conditioning of the form The process in proof of Lemma 3.2 gives a decision tree of depth at least s does not give a downward closed set. To see this, look at the depth-2 function (x 1 x 2 ) (x 2 x 3 x 4 ) ( x 2 x 5 x 6 ) and let ρ be the restriction that gives to all variables while ρ sets ρ (x 1 ) = 1. Then while processing ρ one constructs a decision tree of depth 4 (first x 1 and x 2, and then two more variables depending on the value of x 2 ). On the other hand while processing ρ there is no need to query x 2 since the first clause is true independent of the value of x 2 and thus one ends up with a decision tree of depth 5. After this remark let us return to the proof of Theorem 3.1. Proof: (Of Theorem 3.1) We prove the result by induction over d. Let us see how to establish the base case d = 2 directly from Lemma 3.2. Take a depth two circuit of bottom fanin t and apply a restriction with p = 1 10t. In this situation, except with probability 2 Ω(n/t) we have pn/2 variables remaining and the resulting function is computed by a decision tree of depth strictly less than pn/2. In this case the restricted function has no correlation with parity. In other cases the correlation is at most 1 and the result follows. 8

For the induction step, let (f i ) k i=1 with k S be the sub-circuits of depth 2 appearing in C and apply a restriction with p = 1 40t. We see that except with probability 2 pn/4 this collection of functions can be computed by a common (log S)-partial decision tree of depth at most pn/4. It is also the case that except with probability 2 Ω( pn), at least pn/2 variables are given the value by ρ. This implies that, with probability 1 2 Ω(pn), at any leaf of this common log S-partial decision tree, the restriction of f can be computed by a depth d 1 circuit of bottom fanin at most log S. By the induction hypothesis the correlation of such a function with parity of the remaining variables (which are at least pn/4) is bounded by and the theorem follows. 2 Ω( pn/ log S(log S)d 3), Acknowledgement. I am grateful to Andrej Bogdanov for pointing reminding my that one has to be careful with conditioning. I am also grateful to Schloss Dagstuhl for the great environment and the possibility to do this research. References [1] M. Ajtai. Σ 1 1-formulae on finite structures. Annals of Pure and Applied Logic, 24:1 48, 1983. [2] P. Beame, R. Impagliazzo, and S. Srinivasen. Approximating AC 0 by small height decision tress and a deterministic algorithm for #AC 0 SAT. In Proceedings Computational Complexity, 2012. [3] M. Furst, J.B. Saxe, and M. Sipser. Parity, circuits and the polynomial-time hierarchy. Mathematical Systems Theory, 17:13 27, 1984. [4] J. Håstad. Almost optimal lower bounds for small depth circuits. In Proceedings of the eighteenth annual ACM symposium on Theory of computing, STOC 86, pages 6 20, New York, NY, USA, 1986. ACM. [5] R. Impagliazzo, W. Matthews, and R. Paturi. A satisfiability algorithm for AC 0. In SODA, pages 961 972, 2012. [6] A. Razborov. Bounded-depth formulae over the basis { AND,XOR} and some combintorial problems (in russian). Problems of Cybernetics. Complexity Theory and Applied Mathematical Logic, pages 149 166, 1988. [7] A. Razborov and S. Rudich. Natural proofs. Journal of Computer and System Science, 55:24 35, 1997. [8] M. Sipser. Borel sets and circuit complexity. In Proceedings of the fifteenth annual ACM symposium on Theory of computing, STOC 83, pages 61 69, New York, NY, USA, 1983. ACM. 9

[9] R. Smolensky. Algebraic methods in the theory of lower bounds for boolean circuit complexity. In Proceedings of the nineteenth annual ACM symposium on Theory of computing, STOC 87, pages 77 82, New York, NY, USA, 1987. ACM. [10] A. C-C. Yao. Separating the polynomial-time hierarchy by oracles. In Foundations of Computer Science, 1985., 26th Annual Symposium on, pages 1 10, oct. 1985. 10 ECCC ISSN 1433-8092 http://eccc.hpi-web.de